Path: Top -> Journal -> Jurnal ITB -> 2015 -> Vol.8 No.3

Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider

Journal from gdlhub / 2017-08-14 09:19:10
Oleh : Sergey Igorevich Zhurin, ITB
Dibuat : 2015-12-10, dengan 1 file

Keyword : cyber-insider; cyber-insider threat; insider; insider identification; methods for personnel check; evaluation of personnel
Url : http://journals.itb.ac.id/index.php/jictra/article/view/576
Sumber pengambilan dokumen : Web

A range of international regulatory documents state the importance of counteracting insiders, especially cyber-insiders, in critical facilities and simultaneously providing complex protection, which includes technical, administrative and information protection. In that case the insider, who is familiar with the protection or information system, will be able to find vulnerabilities and weak points in the protection of the information system or control system. One of the most important aspects of the preventive measures against insiders is personnel checks using different techniques, including interviews, social network analysis, and local area network analysis. In the case of having limited financial resources, it is necessary to choose a technique from a checklist rationally.

Beri Komentar ?#(0) | Bookmark

PropertiNilai Properti
ID Publishergdlhub
OrganisasiITB
Nama KontakHerti Yani, S.Kom
AlamatJln. Jenderal Sudirman
KotaJambi
DaerahJambi
NegaraIndonesia
Telepon0741-35095
Fax0741-35093
E-mail Administratorelibrarystikom@gmail.com
E-mail CKOelibrarystikom@gmail.com

Print ...

Kontributor...

  • , Editor: sustriani

Download...

  • Download hanya untuk member.

    576-5287-2-PB
    Download Image
    File : 576-5287-2-PB.pdf

    (341154 bytes)